[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/journals/tpds/LawLY05>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/David_K._Y._Yau>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/John_C._S._Lui>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Terence_K._T._Law>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1109%2FTPDS.2005.114>
foaf:homepage <https://doi.org/10.1109/TPDS.2005.114>
dc:identifier DBLP journals/tpds/LawLY05 (xsd:string)
dc:identifier DOI doi.org%2F10.1109%2FTPDS.2005.114 (xsd:string)
dcterms:issued 2005 (xsd:gYear)
swrc:journal <https://dblp.l3s.de/d2r/resource/journals/tpds>
rdfs:label You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/David_K._Y._Yau>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/John_C._S._Lui>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Terence_K._T._Law>
swrc:number 9 (xsd:string)
swrc:pages 799-813 (xsd:string)
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/journals/tpds/LawLY05/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/journals/tpds/LawLY05>
rdfs:seeAlso <http://dblp.uni-trier.de/db/journals/tpds/tpds16.html#LawLY05>
rdfs:seeAlso <https://doi.org/10.1109/TPDS.2005.114>
dc:subject DDoS attack, traceback, attack traffic filtering, minimum stable time. (xsd:string)
dc:title You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:Article
rdf:type foaf:Document
swrc:volume 16 (xsd:string)